Some modified two-slit interference experiments claim to demonstrate a violation of Bohr’s complementarity principle. A typical such experiment is theoretically analyzed using wave-packet dynamics. The flaw in the an...Some modified two-slit interference experiments claim to demonstrate a violation of Bohr’s complementarity principle. A typical such experiment is theoretically analyzed using wave-packet dynamics. The flaw in the analysis of such experiments is pointed out and it is demonstrated that they do not violate complementarity. In addition, it is quite generally proved that if the state of a particle is such that the modulus square of the wave-function yields an interference pattern, then it necessarily loses which-path information.展开更多
We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob;each is in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary k...We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob;each is in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob’s secure key in order to match Alice’s secure key. This scheme provides an additional layer of security over the standard BB84 protocol.展开更多
文摘Some modified two-slit interference experiments claim to demonstrate a violation of Bohr’s complementarity principle. A typical such experiment is theoretically analyzed using wave-packet dynamics. The flaw in the analysis of such experiments is pointed out and it is demonstrated that they do not violate complementarity. In addition, it is quite generally proved that if the state of a particle is such that the modulus square of the wave-function yields an interference pattern, then it necessarily loses which-path information.
文摘We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob;each is in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob’s secure key in order to match Alice’s secure key. This scheme provides an additional layer of security over the standard BB84 protocol.